Behavioral task
behavioral1
Sample
1560-1-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1560-1-0x0000000000400000-0x0000000000430000-memory.exe
Resource
win10v2004-20230831-en
General
-
Target
1560-1-0x0000000000400000-0x0000000000430000-memory.dmp
-
Size
192KB
-
MD5
27f3a19e2987c5415ae5d68d9a7be3d7
-
SHA1
16344058c5a40a576f77ce119f05823e15b4f2e1
-
SHA256
cf2bef67678c6818414db16ba2463c0b17ae608eddec6acb8bbf6afb8215b8e5
-
SHA512
afd9db3d72afc7cc5e5bb569604e84eeac57f9248ac1008cc9168ed0fdac6e5389703b98c45d64da96a7a9d79f1d4ec1643ee271233dcf97d0c505696a78f9d7
-
SSDEEP
3072:U1D4EkRI04zgdKO+SVg1ibihE0I1yJnQJ58e8hb:U1GRI04zgd+ICE046QP
Malware Config
Extracted
redline
040923_rc
sept4em.tuktuk.ug:11290
-
auth_value
47c23aee408443d5484756dcc468f53a
Signatures
-
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1560-1-0x0000000000400000-0x0000000000430000-memory.dmp
Files
-
1560-1-0x0000000000400000-0x0000000000430000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ